Cyber-Resilient Smart Factories: BI-Augmented Security for Industrial Control Systems (ICS) Article Swipe
The rapid evolution of Industry 4.0 has transformed traditional manufacturing systems into interconnected, data-driven smart factories. These cyber-physical environments rely heavily on Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) platforms, and Industrial Internet of Things (IIoT) devices to enable real-time process automation and optimization. However, this digital interconnectivity also exposes critical assets to sophisticated cyber threats capable of disrupting production, compromising data integrity, and endangering human safety. This paper explores the concept of cyber-resilient smart factories through the integration of Business Intelligence (BI)-augmented security frameworks for ICS environments. It emphasizes how BI-driven analytics can enhance threat visibility, predictive maintenance, and adaptive response mechanisms, thereby fortifying industrial networks against both external and insider attacks. The study proposes a layered security model that combines BI insights with anomaly detection, behavioral analysis, and automated recovery to achieve operational continuity and data-driven decision-making. By merging resilience engineering with intelligent analytics, smart factories can move beyond traditional cybersecurity postures toward proactive, self-healing infrastructures that sustain productivity even under cyber stress.
Related Topics
- Type
- article
- Landing Page
- https://doi.org/10.14293/pr2199.002357.v1
- https://www.scienceopen.com/document_file/bace5812-2b87-42de-8442-e291702add76/ScienceOpenPreprint/Cyber-Resilient%20Smart%20Factories.pdf
- OA Status
- gold
- OpenAlex ID
- https://openalex.org/W7106522359
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7106522359Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.14293/pr2199.002357.v1Digital Object Identifier
- Title
-
Cyber-Resilient Smart Factories: BI-Augmented Security for Industrial Control Systems (ICS)Work title
- Type
-
articleOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-16Full publication date if available
- Authors
-
Salim AhmadList of authors in order
- Landing page
-
https://doi.org/10.14293/pr2199.002357.v1Publisher landing page
- PDF URL
-
https://www.scienceopen.com/document_file/bace5812-2b87-42de-8442-e291702add76/ScienceOpenPreprint/Cyber-Resilient%20Smart%20Factories.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.scienceopen.com/document_file/bace5812-2b87-42de-8442-e291702add76/ScienceOpenPreprint/Cyber-Resilient%20Smart%20Factories.pdfDirect OA link when available
- Concepts
-
Industrial control system, SCADA, Interconnectivity, Computer security, Control system security, Industry 4.0, Automation, Resilience (materials science), Intellectualization, Computer science, Process (computing), Industrial Internet, Critical infrastructure, Cyber-physical system, Big data, Anomaly detection, Control (management), Security controls, Engineering, Hacker, Supervisory control, Analytics, Risk analysis (engineering), Business process, Systems engineering, Crowdsourcing, Process control, Smart grid, Productivity, Business continuity, Data security, Internet of Things, Process automation system, Malware, The InternetTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7106522359 |
|---|---|
| doi | https://doi.org/10.14293/pr2199.002357.v1 |
| ids.doi | https://doi.org/10.14293/pr2199.002357.v1 |
| ids.openalex | https://openalex.org/W7106522359 |
| fwci | 0.0 |
| type | article |
| title | Cyber-Resilient Smart Factories: BI-Augmented Security for Industrial Control Systems (ICS) |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10917 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.6870985627174377 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2207 |
| topics[0].subfield.display_name | Control and Systems Engineering |
| topics[0].display_name | Smart Grid Security and Resilience |
| topics[1].id | https://openalex.org/T10763 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.13553960621356964 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2209 |
| topics[1].subfield.display_name | Industrial and Manufacturing Engineering |
| topics[1].display_name | Digital Transformation in Industry |
| topics[2].id | https://openalex.org/T11807 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.014096600003540516 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2205 |
| topics[2].subfield.display_name | Civil and Structural Engineering |
| topics[2].display_name | Infrastructure Resilience and Vulnerability Analysis |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C40071531 |
| concepts[0].level | 3 |
| concepts[0].score | 0.6292516589164734 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q2513962 |
| concepts[0].display_name | Industrial control system |
| concepts[1].id | https://openalex.org/C113863187 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6072210073471069 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q17498 |
| concepts[1].display_name | SCADA |
| concepts[2].id | https://openalex.org/C25516864 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5656503438949585 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1665949 |
| concepts[2].display_name | Interconnectivity |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5623113512992859 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C172862783 |
| concepts[4].level | 5 |
| concepts[4].score | 0.5618027448654175 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q5165888 |
| concepts[4].display_name | Control system security |
| concepts[5].id | https://openalex.org/C2777986313 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5453919172286987 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1661989 |
| concepts[5].display_name | Industry 4.0 |
| concepts[6].id | https://openalex.org/C115901376 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5046703815460205 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q184199 |
| concepts[6].display_name | Automation |
| concepts[7].id | https://openalex.org/C2779585090 |
| concepts[7].level | 2 |
| concepts[7].score | 0.48682907223701477 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3457762 |
| concepts[7].display_name | Resilience (materials science) |
| concepts[8].id | https://openalex.org/C130631938 |
| concepts[8].level | 2 |
| concepts[8].score | 0.48630714416503906 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q144894 |
| concepts[8].display_name | Intellectualization |
| concepts[9].id | https://openalex.org/C41008148 |
| concepts[9].level | 0 |
| concepts[9].score | 0.4385325312614441 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[9].display_name | Computer science |
| concepts[10].id | https://openalex.org/C98045186 |
| concepts[10].level | 2 |
| concepts[10].score | 0.4240608215332031 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[10].display_name | Process (computing) |
| concepts[11].id | https://openalex.org/C202839342 |
| concepts[11].level | 3 |
| concepts[11].score | 0.42100951075553894 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q60740481 |
| concepts[11].display_name | Industrial Internet |
| concepts[12].id | https://openalex.org/C29852176 |
| concepts[12].level | 2 |
| concepts[12].score | 0.4150555729866028 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q373338 |
| concepts[12].display_name | Critical infrastructure |
| concepts[13].id | https://openalex.org/C179768478 |
| concepts[13].level | 2 |
| concepts[13].score | 0.3915589153766632 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q1120057 |
| concepts[13].display_name | Cyber-physical system |
| concepts[14].id | https://openalex.org/C75684735 |
| concepts[14].level | 2 |
| concepts[14].score | 0.36501771211624146 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q858810 |
| concepts[14].display_name | Big data |
| concepts[15].id | https://openalex.org/C739882 |
| concepts[15].level | 2 |
| concepts[15].score | 0.355347216129303 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[15].display_name | Anomaly detection |
| concepts[16].id | https://openalex.org/C2775924081 |
| concepts[16].level | 2 |
| concepts[16].score | 0.35525158047676086 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q55608371 |
| concepts[16].display_name | Control (management) |
| concepts[17].id | https://openalex.org/C178148461 |
| concepts[17].level | 3 |
| concepts[17].score | 0.3291738033294678 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q1632136 |
| concepts[17].display_name | Security controls |
| concepts[18].id | https://openalex.org/C127413603 |
| concepts[18].level | 0 |
| concepts[18].score | 0.3220531642436981 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[18].display_name | Engineering |
| concepts[19].id | https://openalex.org/C86844869 |
| concepts[19].level | 2 |
| concepts[19].score | 0.3128279745578766 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q2798820 |
| concepts[19].display_name | Hacker |
| concepts[20].id | https://openalex.org/C92991967 |
| concepts[20].level | 3 |
| concepts[20].score | 0.31067004799842834 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q7644329 |
| concepts[20].display_name | Supervisory control |
| concepts[21].id | https://openalex.org/C79158427 |
| concepts[21].level | 2 |
| concepts[21].score | 0.3055332601070404 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q485396 |
| concepts[21].display_name | Analytics |
| concepts[22].id | https://openalex.org/C112930515 |
| concepts[22].level | 1 |
| concepts[22].score | 0.29791459441185 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q4389547 |
| concepts[22].display_name | Risk analysis (engineering) |
| concepts[23].id | https://openalex.org/C85345410 |
| concepts[23].level | 3 |
| concepts[23].score | 0.2902110517024994 |
| concepts[23].wikidata | https://www.wikidata.org/wiki/Q851587 |
| concepts[23].display_name | Business process |
| concepts[24].id | https://openalex.org/C201995342 |
| concepts[24].level | 1 |
| concepts[24].score | 0.27888354659080505 |
| concepts[24].wikidata | https://www.wikidata.org/wiki/Q682496 |
| concepts[24].display_name | Systems engineering |
| concepts[25].id | https://openalex.org/C62230096 |
| concepts[25].level | 2 |
| concepts[25].score | 0.2774682641029358 |
| concepts[25].wikidata | https://www.wikidata.org/wiki/Q275969 |
| concepts[25].display_name | Crowdsourcing |
| concepts[26].id | https://openalex.org/C155386361 |
| concepts[26].level | 3 |
| concepts[26].score | 0.2739914357662201 |
| concepts[26].wikidata | https://www.wikidata.org/wiki/Q1649571 |
| concepts[26].display_name | Process control |
| concepts[27].id | https://openalex.org/C10558101 |
| concepts[27].level | 2 |
| concepts[27].score | 0.2707175016403198 |
| concepts[27].wikidata | https://www.wikidata.org/wiki/Q689855 |
| concepts[27].display_name | Smart grid |
| concepts[28].id | https://openalex.org/C204983608 |
| concepts[28].level | 2 |
| concepts[28].score | 0.26934313774108887 |
| concepts[28].wikidata | https://www.wikidata.org/wiki/Q2111958 |
| concepts[28].display_name | Productivity |
| concepts[29].id | https://openalex.org/C2778143579 |
| concepts[29].level | 2 |
| concepts[29].score | 0.26364371180534363 |
| concepts[29].wikidata | https://www.wikidata.org/wiki/Q831801 |
| concepts[29].display_name | Business continuity |
| concepts[30].id | https://openalex.org/C10511746 |
| concepts[30].level | 3 |
| concepts[30].score | 0.26170265674591064 |
| concepts[30].wikidata | https://www.wikidata.org/wiki/Q899388 |
| concepts[30].display_name | Data security |
| concepts[31].id | https://openalex.org/C81860439 |
| concepts[31].level | 2 |
| concepts[31].score | 0.25445273518562317 |
| concepts[31].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[31].display_name | Internet of Things |
| concepts[32].id | https://openalex.org/C21457203 |
| concepts[32].level | 3 |
| concepts[32].score | 0.2529720366001129 |
| concepts[32].wikidata | https://www.wikidata.org/wiki/Q4056293 |
| concepts[32].display_name | Process automation system |
| concepts[33].id | https://openalex.org/C541664917 |
| concepts[33].level | 2 |
| concepts[33].score | 0.25269615650177 |
| concepts[33].wikidata | https://www.wikidata.org/wiki/Q14001 |
| concepts[33].display_name | Malware |
| concepts[34].id | https://openalex.org/C110875604 |
| concepts[34].level | 2 |
| concepts[34].score | 0.25016912817955017 |
| concepts[34].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[34].display_name | The Internet |
| keywords[0].id | https://openalex.org/keywords/industrial-control-system |
| keywords[0].score | 0.6292516589164734 |
| keywords[0].display_name | Industrial control system |
| keywords[1].id | https://openalex.org/keywords/scada |
| keywords[1].score | 0.6072210073471069 |
| keywords[1].display_name | SCADA |
| keywords[2].id | https://openalex.org/keywords/interconnectivity |
| keywords[2].score | 0.5656503438949585 |
| keywords[2].display_name | Interconnectivity |
| keywords[3].id | https://openalex.org/keywords/control-system-security |
| keywords[3].score | 0.5618027448654175 |
| keywords[3].display_name | Control system security |
| keywords[4].id | https://openalex.org/keywords/industry-4.0 |
| keywords[4].score | 0.5453919172286987 |
| keywords[4].display_name | Industry 4.0 |
| keywords[5].id | https://openalex.org/keywords/automation |
| keywords[5].score | 0.5046703815460205 |
| keywords[5].display_name | Automation |
| keywords[6].id | https://openalex.org/keywords/resilience |
| keywords[6].score | 0.48682907223701477 |
| keywords[6].display_name | Resilience (materials science) |
| keywords[7].id | https://openalex.org/keywords/intellectualization |
| keywords[7].score | 0.48630714416503906 |
| keywords[7].display_name | Intellectualization |
| keywords[8].id | https://openalex.org/keywords/process |
| keywords[8].score | 0.4240608215332031 |
| keywords[8].display_name | Process (computing) |
| keywords[9].id | https://openalex.org/keywords/industrial-internet |
| keywords[9].score | 0.42100951075553894 |
| keywords[9].display_name | Industrial Internet |
| language | |
| locations[0].id | doi:10.14293/pr2199.002357.v1 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.scienceopen.com/document_file/bace5812-2b87-42de-8442-e291702add76/ScienceOpenPreprint/Cyber-Resilient%20Smart%20Factories.pdf |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.14293/pr2199.002357.v1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A2175521997 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Salim Ahmad |
| authorships[0].countries | |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I-1 |
| authorships[0].affiliations[0].raw_affiliation_string | Independent Researcher |
| authorships[0].institutions[0].id | https://openalex.org/I-1 |
| authorships[0].institutions[0].ror | |
| authorships[0].institutions[0].type | |
| authorships[0].institutions[0].lineage | https://openalex.org/I-1 |
| authorships[0].institutions[0].country_code | |
| authorships[0].institutions[0].display_name | |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Salim Ahmad |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Independent Researcher |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.scienceopen.com/document_file/bace5812-2b87-42de-8442-e291702add76/ScienceOpenPreprint/Cyber-Resilient%20Smart%20Factories.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-11-25T00:00:00 |
| display_name | Cyber-Resilient Smart Factories: BI-Augmented Security for Industrial Control Systems (ICS) |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-25T21:42:39.735039 |
| primary_topic.id | https://openalex.org/T10917 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.6870985627174377 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2207 |
| primary_topic.subfield.display_name | Control and Systems Engineering |
| primary_topic.display_name | Smart Grid Security and Resilience |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.14293/pr2199.002357.v1 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.scienceopen.com/document_file/bace5812-2b87-42de-8442-e291702add76/ScienceOpenPreprint/Cyber-Resilient%20Smart%20Factories.pdf |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.14293/pr2199.002357.v1 |
| primary_location.id | doi:10.14293/pr2199.002357.v1 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.scienceopen.com/document_file/bace5812-2b87-42de-8442-e291702add76/ScienceOpenPreprint/Cyber-Resilient%20Smart%20Factories.pdf |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.14293/pr2199.002357.v1 |
| publication_date | 2025-11-16 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 119 |
| abstract_inverted_index.BI | 125 |
| abstract_inverted_index.By | 142 |
| abstract_inverted_index.It | 91 |
| abstract_inverted_index.of | 3, 36, 60, 75, 82 |
| abstract_inverted_index.on | 21 |
| abstract_inverted_index.to | 40, 55, 135 |
| abstract_inverted_index.4.0 | 5 |
| abstract_inverted_index.ICS | 89 |
| abstract_inverted_index.The | 0, 116 |
| abstract_inverted_index.and | 28, 33, 45, 66, 102, 113, 132, 139 |
| abstract_inverted_index.can | 96, 151 |
| abstract_inverted_index.for | 88 |
| abstract_inverted_index.has | 6 |
| abstract_inverted_index.how | 93 |
| abstract_inverted_index.the | 73, 80 |
| abstract_inverted_index.Data | 29 |
| abstract_inverted_index.This | 70 |
| abstract_inverted_index.also | 51 |
| abstract_inverted_index.both | 111 |
| abstract_inverted_index.data | 64 |
| abstract_inverted_index.even | 164 |
| abstract_inverted_index.into | 11 |
| abstract_inverted_index.move | 152 |
| abstract_inverted_index.rely | 19 |
| abstract_inverted_index.that | 123, 161 |
| abstract_inverted_index.this | 48 |
| abstract_inverted_index.with | 127, 146 |
| abstract_inverted_index.These | 16 |
| abstract_inverted_index.cyber | 57, 166 |
| abstract_inverted_index.human | 68 |
| abstract_inverted_index.model | 122 |
| abstract_inverted_index.paper | 71 |
| abstract_inverted_index.rapid | 1 |
| abstract_inverted_index.smart | 14, 77, 149 |
| abstract_inverted_index.study | 117 |
| abstract_inverted_index.under | 165 |
| abstract_inverted_index.(ICS), | 25 |
| abstract_inverted_index.(IIoT) | 38 |
| abstract_inverted_index.Things | 37 |
| abstract_inverted_index.assets | 54 |
| abstract_inverted_index.beyond | 153 |
| abstract_inverted_index.enable | 41 |
| abstract_inverted_index.threat | 98 |
| abstract_inverted_index.toward | 157 |
| abstract_inverted_index.(SCADA) | 31 |
| abstract_inverted_index.Control | 23, 27 |
| abstract_inverted_index.Systems | 24 |
| abstract_inverted_index.achieve | 136 |
| abstract_inverted_index.against | 110 |
| abstract_inverted_index.anomaly | 128 |
| abstract_inverted_index.capable | 59 |
| abstract_inverted_index.concept | 74 |
| abstract_inverted_index.devices | 39 |
| abstract_inverted_index.digital | 49 |
| abstract_inverted_index.enhance | 97 |
| abstract_inverted_index.exposes | 52 |
| abstract_inverted_index.heavily | 20 |
| abstract_inverted_index.insider | 114 |
| abstract_inverted_index.layered | 120 |
| abstract_inverted_index.merging | 143 |
| abstract_inverted_index.process | 43 |
| abstract_inverted_index.safety. | 69 |
| abstract_inverted_index.stress. | 167 |
| abstract_inverted_index.sustain | 162 |
| abstract_inverted_index.systems | 10 |
| abstract_inverted_index.thereby | 106 |
| abstract_inverted_index.threats | 58 |
| abstract_inverted_index.through | 79 |
| abstract_inverted_index.Business | 83 |
| abstract_inverted_index.However, | 47 |
| abstract_inverted_index.Industry | 4 |
| abstract_inverted_index.Internet | 35 |
| abstract_inverted_index.adaptive | 103 |
| abstract_inverted_index.attacks. | 115 |
| abstract_inverted_index.combines | 124 |
| abstract_inverted_index.critical | 53 |
| abstract_inverted_index.explores | 72 |
| abstract_inverted_index.external | 112 |
| abstract_inverted_index.insights | 126 |
| abstract_inverted_index.networks | 109 |
| abstract_inverted_index.postures | 156 |
| abstract_inverted_index.proposes | 118 |
| abstract_inverted_index.recovery | 134 |
| abstract_inverted_index.response | 104 |
| abstract_inverted_index.security | 86, 121 |
| abstract_inverted_index.BI-driven | 94 |
| abstract_inverted_index.analysis, | 131 |
| abstract_inverted_index.analytics | 95 |
| abstract_inverted_index.automated | 133 |
| abstract_inverted_index.evolution | 2 |
| abstract_inverted_index.factories | 78, 150 |
| abstract_inverted_index.real-time | 42 |
| abstract_inverted_index.Industrial | 22, 34 |
| abstract_inverted_index.analytics, | 148 |
| abstract_inverted_index.automation | 44 |
| abstract_inverted_index.behavioral | 130 |
| abstract_inverted_index.continuity | 138 |
| abstract_inverted_index.detection, | 129 |
| abstract_inverted_index.disrupting | 61 |
| abstract_inverted_index.emphasizes | 92 |
| abstract_inverted_index.factories. | 15 |
| abstract_inverted_index.fortifying | 107 |
| abstract_inverted_index.frameworks | 87 |
| abstract_inverted_index.industrial | 108 |
| abstract_inverted_index.integrity, | 65 |
| abstract_inverted_index.platforms, | 32 |
| abstract_inverted_index.predictive | 100 |
| abstract_inverted_index.proactive, | 158 |
| abstract_inverted_index.resilience | 144 |
| abstract_inverted_index.Acquisition | 30 |
| abstract_inverted_index.Supervisory | 26 |
| abstract_inverted_index.data-driven | 13, 140 |
| abstract_inverted_index.endangering | 67 |
| abstract_inverted_index.engineering | 145 |
| abstract_inverted_index.integration | 81 |
| abstract_inverted_index.intelligent | 147 |
| abstract_inverted_index.mechanisms, | 105 |
| abstract_inverted_index.operational | 137 |
| abstract_inverted_index.production, | 62 |
| abstract_inverted_index.traditional | 8, 154 |
| abstract_inverted_index.transformed | 7 |
| abstract_inverted_index.visibility, | 99 |
| abstract_inverted_index.Intelligence | 84 |
| abstract_inverted_index.compromising | 63 |
| abstract_inverted_index.environments | 18 |
| abstract_inverted_index.maintenance, | 101 |
| abstract_inverted_index.productivity | 163 |
| abstract_inverted_index.self-healing | 159 |
| abstract_inverted_index.cybersecurity | 155 |
| abstract_inverted_index.environments. | 90 |
| abstract_inverted_index.manufacturing | 9 |
| abstract_inverted_index.optimization. | 46 |
| abstract_inverted_index.sophisticated | 56 |
| abstract_inverted_index.(BI)-augmented | 85 |
| abstract_inverted_index.cyber-physical | 17 |
| abstract_inverted_index.cyber-resilient | 76 |
| abstract_inverted_index.infrastructures | 160 |
| abstract_inverted_index.interconnected, | 12 |
| abstract_inverted_index.decision-making. | 141 |
| abstract_inverted_index.interconnectivity | 50 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.7971134 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |